Sciweavers

106 search results - page 16 / 22
» Constraint Authoring System: An Empirical Evaluation
Sort
View
OZCHI
2009
ACM
15 years 4 months ago
A study of email and SMS use in rural Indonesia
This paper describes a two-year research study that piloted and evaluated the use of low-cost, low-bandwidth Information and Communications Technology (ICT) to support meetings be...
Dean M. G. Hargreaves, Toni Robertson
CHI
2008
ACM
15 years 10 months ago
Interlaced QWERTY: accommodating ease of visual search and input flexibility in shape writing
Shape writing is an input technology for touch-screen mobile phones and pen-tablets. To shape write text, the user spells out word patterns by sliding a finger or stylus over a gr...
Shumin Zhai, Per Ola Kristensson
JAMIA
2011
68views more  JAMIA 2011»
14 years 16 days ago
A secure protocol for protecting the identity of providers when disclosing data for disease surveillance
Background Providers have been reluctant to disclose patient data for public-health purposes. Even if patient privacy is ensured, the desire to protect provider confidentiality h...
Khaled El Emam, Jun Hu, Jay Mercer, Liam Peyton, M...
FGIT
2010
Springer
14 years 7 months ago
Improved Location Aided Cluster Based Routing Protocol for GPS Enabled Manets
Routing has been the main challenge for ad hoc networks due to dynamic topology as well as resource constraints. Completely GPS free as well as GPS scarce positioning systems for ...
S. Mangai, A. Tamilarasi
79
Voted
WOSP
2004
ACM
15 years 3 months ago
Early performance testing of distributed software applications
Performance characteristics, such as response time, throughput and scalability, are key quality attributes of distributed applications. Current practice, however, rarely applies s...
Giovanni Denaro, Andrea Polini, Wolfgang Emmerich